Scan to download
BTC $65,842.53 -3.73%
ETH $1,986.58 -2.75%
BNB $609.04 -2.57%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $466.03 +1.36%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.8762 -4.16%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%
BTC $65,842.53 -3.73%
ETH $1,986.58 -2.75%
BNB $609.04 -2.57%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $466.03 +1.36%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.8762 -4.16%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%

Beosin: JPEG'd attack reason is reentrancy attack

2023-07-30 23:00:22
Collection

ChainCatcher message, according to the analysis by the Beosin security team, the root cause of the attack on the JPEG'd project lies in a reentrancy issue.

It is reported that the attacker added liquidity through reentrancy into the addliquidity function while calling the removeliquidity function to remove liquidity. Since the balance update occurs before reentrancy into the add_liquidity function, this leads to an error in price calculation.

Related tags
app_icon
ChainCatcher Building the Web3 world with innovations.